Medium severity5.0OSV Advisory· Published Nov 28, 2025· Updated Apr 15, 2026
CVE-2025-66371
CVE-2025-66371
Description
Peppol-py before 1.1.1 allows XXE attacks because of the Saxon configuration. When validating XML-based invoices, the XML parser could read files from the filesystem and expose their content to a remote host.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
peppol_pyPyPI | < 1.1.1 | 1.1.1 |
Affected products
1Patches
1349a4bff8adbPrevent Saxon URL access, avoids XXE vulnerabilities (#16)
1 file changed · +2 −0
src/peppol_py/validation.py+2 −0 modified@@ -28,6 +28,8 @@ def validate_peppol_document( # only works with XSLT 1.0, and the Schematron is written in XSLT # 2.0 with PySaxonProcessor(license=False) as proc: + # Prevent XXE: disallow access to any type of URL + proc.set_configuration_property("http://saxon.sf.net/feature/allowedProtocols", "") for validation_xsl_file in schematron_xsls: if not os.path.exists(validation_xsl_file): # Resolve internal files
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-24hm-wm2h-h8w7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-66371ghsaADVISORY
- github.com/iterasdev/peppol-py/commit/349a4bff8adb6205ea411bac8d7a06da0477abd7nvdWEB
- github.com/iterasdev/peppol-py/pull/16nvdWEB
- github.com/iterasdev/peppol-py/releases/tag/1.1.1nvdWEB
- invoice.secvuln.infonvdWEB
News mentions
0No linked articles in our index yet.